Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for redirecting access request, medium and device

An access request and redirection technology, applied in the computer field, can solve the problems of counterfeit replies, inability to redirect HTTPS requests, inability to parse content, etc., achieving the effect of simple deployment, no network bottlenecks, and no network failure risks.

Inactive Publication Date: 2018-08-24
SHENZHEN LEAGSOFT TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, it is still impossible to redirect the user's HTTPS request, because the HTTPS data packet is an encrypted data packet, its content cannot be parsed, and the reply is forged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for redirecting access request, medium and device
  • Method for redirecting access request, medium and device
  • Method for redirecting access request, medium and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0042] Please refer to figure 1 , figure 1 It is a flowchart of a method for redirecting an access request provided in the first embodiment of the present invention. The method for redirecting an access request provided in this embodiment includes:

[0043] Step S101: copying the DNS request sent by the client when accessing the target server.

[0044] Step S102: Utilize a DNS spoofing service to resolve the DNS request, and send a spoofed IP address to the client.

[0045] Step S103: Receive an access request from the client to access the counterfeit IP address.

[0046] Step S104: According to the access request, send a redirect URL to the corresponding client, so that the client jumps to a redirect page according to the redirect URL.

[0047] When the user accesses the target server, the client will first send a DNS request to the DNS server, obtain the target IP address of the target server sent by the DNS server, and then access the corresponding target server accordin...

no. 2 example

[0061] In the above-mentioned first embodiment, a method for redirecting an access request is provided. In combination with the above-mentioned first embodiment, the second embodiment of the present invention provides a computer-readable storage medium on which a computer program is stored. When the program is executed by the processor, the method for redirecting the access request provided by the above-mentioned first embodiment is implemented.

no. 3 example

[0063] In combination with the method for redirecting an access request provided in the first embodiment, the present invention also provides a computer device, including: a memory, a processor, and a computer program stored on the memory and operable on the processor, the processing When the server executes the program, the method for redirecting the access request provided by the above-mentioned first embodiment is implemented. figure 2 A schematic diagram of a hardware structure of a computer device provided by an embodiment of the present invention is shown.

[0064] Specifically, the above-mentioned processor 201 may include a central processing unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more integrated circuits in the embodiments of the present invention.

[0065] Memory 202 may include mass storage for data or instructions. By way of example and not limitation, the memory 202 may include a hard disk drive...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for redirecting an access request, a medium and a device. The method comprises the steps of copying a DNS request sent when a client accesses a target server; analyzingthe DNS request by using a DNS counterfeit service, and sending a counterfeit IP address to the client; receiving an access request that the client accesses the counterfeit IP address; and accordingto the counterfeit request, sending a redirection website to the corresponding client, so that the client jumps to a redirection page according to the redirection website. The redirection of an HTTP or HTTPS request can be implemented; and a total bypass mode is adopted by the method, so the deployment is simple, a network does not need to be transformed, and no network bottleneck and network failure risk exist.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method, medium and equipment for redirecting access requests. Background technique [0002] HTTPS is an HTTP channel with the goal of security. Simply speaking, it is a secure version of HTTP, that is, an SSL layer is added under HTTP. The security basis of HTTPS is SSL, so the detailed content of encryption requires SSL. HTTP is a hypertext transfer protocol, and information is transmitted in plain text, while HTTPS is a secure SSL encrypted transfer protocol. [0003] In the prior art, it is still impossible to redirect the user's HTTPS request, because the HTTPS data packet is an encrypted data packet, its content cannot be parsed, and the reply is forged. Contents of the invention [0004] Aiming at the defects in the prior art, the present invention provides a method, medium and equipment for redirecting access requests, which can realize the redirection of HTTPS access request...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/12H04L29/06
CPCH04L63/08H04L67/02H04L61/4511H04L67/60
Inventor 陈浩牛劲王新成
Owner SHENZHEN LEAGSOFT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products